Description
A security flaw has been discovered in WeKan up to 8.20. This vulnerability affects unknown code of the file server/methods/fixDuplicateLists.js of the component Administrative Repair Handler. Performing a manipulation results in improper access controls. It is possible to initiate the attack remotely. Upgrading to version 8.21 is able to resolve this issue. The patch is named 4ce181d17249778094f73d21515f7f863f554743. It is advisable to upgrade the affected component.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Access Control (administrative function abuse)
Action: Patch
AI Analysis

Impact

The flaw lies in the Administrative Repair Handler’s file server/methods/fixDuplicateLists.js, allowing remote actors to manipulate the system in a way that bypasses intended access controls. Because the authentication checks are not enforced properly, an attacker can invoke administrative functions without proper privileges, effectively achieving an unauthorized elevation of privileges. The problem is classified as CWE‑266 and CWE‑284, which describe permissions‑related weaknesses.

Affected Systems

WeKan from the project is affected, with all releases up to and including 8.20 potentially vulnerable. The fix arrives in version 8.21, which replaces or patches the problematic code. No other versions are listed as affected in the advisories.

Risk and Exploitability

The CVSS score of 5.3 reflects a moderate risk, while the EPSS score of under 1 % indicates a very low probability of exploitation in the wild. The vulnerability is not cataloged by CISA’s KEV list. Exploitation would require remote access to the application’s endpoints, and the attacker can trigger the flaw by sending crafted requests to the Administrative Repair Handler before the patch is applied.

Generated by OpenCVE AI on April 18, 2026 at 13:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to WeKan version 8.21 or later, which contains the fixed code.
  • Configure the Repair Handler endpoint to require admin‑level authentication and enforce role checks; remove or disable the endpoint for non‑admin users.
  • Restrict network access to the Repair Handler by firewall or IP whitelist and monitor logs for any unauthorized requests.

Generated by OpenCVE AI on April 18, 2026 at 13:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Wekan Project
Wekan Project wekan
Vendors & Products Wekan Project
Wekan Project wekan

Sun, 08 Feb 2026 02:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in WeKan up to 8.20. This vulnerability affects unknown code of the file server/methods/fixDuplicateLists.js of the component Administrative Repair Handler. Performing a manipulation results in improper access controls. It is possible to initiate the attack remotely. Upgrading to version 8.21 is able to resolve this issue. The patch is named 4ce181d17249778094f73d21515f7f863f554743. It is advisable to upgrade the affected component.
Title WeKan Administrative Repair fixDuplicateLists.js FixDuplicateBleed access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Wekan Project Wekan
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:54:07.822Z

Reserved: 2026-02-08T01:06:06.190Z

Link: CVE-2026-2206

cve-icon Vulnrichment

Updated: 2026-02-10T19:39:03.955Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T02:15:57.263

Modified: 2026-02-11T18:58:46.427

Link: CVE-2026-2206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses